Cover image of show InfoSec.Watch

InfoSec.Watch

Podcast by Infosec.Watch

English

News & politics

Limited Offer

2 months for 19 kr.

Then 99 kr. / monthCancel anytime.

  • 20 hours of audiobooks / month
  • Podcasts only on Podimo
  • All free podcasts
Get Started

About InfoSec.Watch

The InfoSec.Watch Podcast delivers the week’s most important cybersecurity news in a fast, clear, and actionable format. Each episode breaks down major incidents, vulnerabilities, threat-actor activity, and security trends affecting modern organizations — without the noise or hype.The show translates complex cyber topics into practical insights you can use immediately in your job, whether you work in security engineering, cloud security, threat detection, governance, or IT.If you want to stay ahead of emerging threats, sharpen your defensive mindset, and get a reliable summary of what actually matters each week, this is your new essential briefing.Actionable Cybersecurity Insights — Every Week.

All episodes

20 episodes

episode 138 - Security Leverage Points artwork

138 - Security Leverage Points

Send us Fan Mail [https://www.buzzsprout.com/2557837/fan_mail/new] We track the security stories that give attackers the most leverage, from AI-assisted exploit development to SaaS platform compromise, manufacturing ransomware, and high-impact vulnerabilities. We end with a practical defensive check: a short control plane exposure register that shows exactly which systems could change trust, access, routing, revenue, or production at scale.  • AI-assisted zero-day exploit and why admin tools move to the top of the patch queue  • Phishing-resistant MFA and reviewing trusted path assumptions for bypass risk  • Canvas incident and the need for tenant-level SaaS impact assessment  • Manufacturing ransomware as business disruption strategy across logistics and production  • Cisco Catalyst SD-WAN controller authentication bypass and control plane blast radius  • Exchange OWA KEV-driven mitigations and using deadlines for escalation  • WordPress FunnelKit exploit leading to WooCommerce checkout skimming and script audits  • Leverage-point thinking for modern asset inventory and exposure management  • Control plane exposure register fields, owners, logs, rollback paths, review cadence  If you want daily updates between episodes, you can find us on X, Facebook, and LinkedIn. Just search InfoSecWatch. And if you haven't already, head over to InfoSec.watch and grab the free weekly newsletter. It's concise, it's practitioner focused, and it lands every week.  Support the show [https://www.buzzsprout.com/2557837/support] Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch https://www.infosec.watch Follow us for daily updates: - X (Twitter)https://x.com/InfosecDotWatch - LinkedInhttps://www.linkedin.com/company/infosec-watch - Facebook https://www.facebook.com/infosec.watch- Stay secure out there!

18 May 2026 - 10 min
episode 130 - When Trusted Tools Turn On You artwork

130 - When Trusted Tools Turn On You

Send us Fan Mail [https://www.buzzsprout.com/2557837/fan_mail/new] We track how trust boundaries fail across the modern stack, from CI/CD supply chain compromise to phishing-driven account takeover and remote assistance abuse. We also break down actively exploited vulnerabilities and a practical tier 0 validation loop that treats patching like incident response, not routine maintenance. • supply chain compromise risk when trusted CI/CD tooling is abused for credential theft • behavior-based hunting on build systems, including anomalous execution and network egress • phishing campaigns against Signal and WhatsApp framed as identity compromise at scale • Microsoft Teams social engineering path to Quick Assist remote access and intrusion expansion • vulnerability triage for active exploitation, including Cisco FMC CVE-2026-20131 and rapid weaponization of new disclosures • mobile exploit kit reporting and why device takeover belongs in tier 0 thinking • IoT botnet disruption as a prompt to inventory unmanaged devices and validate network visibility • one-week tier 0 validation loop: verify versions, remove exposure, review logs, rotate secrets Follow the show on X, Facebook, and LinkedIn, and subscribe at https://infosec.watch. Support the show [https://www.buzzsprout.com/2557837/support] Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch https://www.infosec.watch Follow us for daily updates: - X (Twitter)https://x.com/InfosecDotWatch - LinkedInhttps://www.linkedin.com/company/infosec-watch - Facebook https://www.facebook.com/infosec.watch- Stay secure out there!

26 Mar 2026 - 17 min
episode 129 - Quick Assist, Slow Panic artwork

129 - Quick Assist, Slow Panic

Send us Fan Mail [https://www.buzzsprout.com/2557837/fan_mail/new] We track how attackers keep turning trusted channels into reliable intrusion paths, from extension marketplaces to chat platforms and developer dependencies. We also lay out what defenders should patch first and how to validate fixes so security work actually reduces risk. • Glasswarm escalation against Open VSX using a modular loader for stealthier propagation • Why defenders need full intrusion chain telemetry across execution, persistence and C2 • Microsoft Teams phishing that impersonates IT and abuses Quick Assist for remote access • Living off the land detection focused on behaviors rather than specific malware files • Astronata backdooring React Native packages to steal crypto wallets and developer credentials • Software supply chain hygiene through provenance checks and dependency trust path reviews • Chrome vulnerabilities exploited in the wild and why pre-patch hunting matters • Veeam critical flaws and treating backup infrastructure as a tier zero asset • VPN credential theft campaigns and enforcing MFA across every authentication path • Post-patching rigor with version checks, exposure validation, log review and secret rotation Support the show [https://www.buzzsprout.com/2557837/support] Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch https://www.infosec.watch Follow us for daily updates: - X (Twitter)https://x.com/InfosecDotWatch - LinkedInhttps://www.linkedin.com/company/infosec-watch - Facebook https://www.facebook.com/infosec.watch- Stay secure out there!

20 Mar 2026 - 8 min
episode 128 - AI Malware Floods And Patch Tsunamis artwork

128 - AI Malware Floods And Patch Tsunamis

Send us Fan Mail [https://www.buzzsprout.com/2557837/fan_mail/new] We track a clear theme across this week’s security headlines: everything is getting bigger, faster, and harder to manage, from AI-generated malware to massive patch waves. We focus on cutting blast radius with risk-based patching, resilience-first strategy, and automation that can keep up with machine-scale attacks.  • AI-assisted malware as a volume play that strains signature-based detection  • CISA KEV additions affecting physical security tech and industrial OT environments  • Cisco firewall patch surge and why perfect-10 bugs demand rapid edge triage  • Risk-based prioritization starting with the most exposed internet-facing devices  • VMware ARIA Operations auth bypass as a high-impact management-plane risk  • Nginx UI remote code execution as a supply chain style weak link  • Resilience mindset built on detection, response, and rehearsed incident response plans  • Automated sandboxing and modern EDR to counter high-volume malware  • Continuous security awareness training that teaches and builds security culture  Don't forget to follow us on X, Facebook, or LinkedIn, and be sure to subscribe to our newsletter at infosec.watch for the latest updates.  Support the show [https://www.buzzsprout.com/2557837/support] Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch https://www.infosec.watch Follow us for daily updates: - X (Twitter)https://x.com/InfosecDotWatch - LinkedInhttps://www.linkedin.com/company/infosec-watch - Facebook https://www.facebook.com/infosec.watch- Stay secure out there!

12 Mar 2026 - 8 min
episode 127 - From Cisco To EV Chargers: Active Exploits And Urgent Patches artwork

127 - From Cisco To EV Chargers: Active Exploits And Urgent Patches

Send us Fan Mail [https://www.buzzsprout.com/2557837/fan_mail/new] A wave of edge and control‑plane threats drives urgent patching and smarter validation across Cisco SD‑WAN, EV charging, FileZen, and Serve‑U. We map real exploits, spotlight APT28 tradecraft, unpack Google risk shifts, and share a post‑patch playbook that assumes breach. • Cisco SD‑WAN 10.0 authentication bypass and active exploitation • CISA KEV update for FileZen and patch prioritization • EV charging platform flaws enabling session hijack and station impersonation • APT28 targeting MSHTML and legacy components as modern vectors • One Uptime 10.0 root‑level exploit via traceroute probes • Google localhost WebSocket risk and policy reversals on token proxying • Governance for agentic AI with supervised fine‑tuning and oversight • Quick hits on North Korean air‑gap tools and UNC2814 disruption • Serve‑U critical updates and file transfer exposure • EU CRA impacts on open source supply chains • Post‑patch validation: verify versions, confirm exposure is gone, hunt logs, rotate secrets • Continuous exposure management for control planes and edge systems For more in-depth analysis and links to everything we discussed today, be sure to subscribe to our newsletter at infosec.watch Support the show [https://www.buzzsprout.com/2557837/support] Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch https://www.infosec.watch Follow us for daily updates: - X (Twitter)https://x.com/InfosecDotWatch - LinkedInhttps://www.linkedin.com/company/infosec-watch - Facebook https://www.facebook.com/infosec.watch- Stay secure out there!

6 Mar 2026 - 10 min
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
Rigtig god tjeneste med gode eksklusive podcasts og derudover et kæmpe udvalg af podcasts og lydbøger. Kan varmt anbefales, om ikke andet så udelukkende pga Dårligdommerne, Klovn podcast, Hakkedrengene og Han duo 😁 👍
Podimo er blevet uundværlig! Til lange bilture, hverdagen, rengøringen og i det hele taget, når man trænger til lidt adspredelse.

Choose your subscription

Most popular

Limited Offer

Premium

20 hours of audiobooks

  • Podcasts only on Podimo

  • No ads in Podimo shows

  • Cancel anytime

2 months for 19 kr.
Then 99 kr. / month

Get Started

Premium Plus

Unlimited audiobooks

  • Podcasts only on Podimo

  • No ads in Podimo shows

  • Cancel anytime

Start 7 days free trial
Then 129 kr. / month

Start for free

Only on Podimo

Popular audiobooks

Get Started

2 months for 19 kr. Then 99 kr. / month. Cancel anytime.